Analysis

  • max time kernel
    153s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 05:51

General

  • Target

    2024-03-10_4c64bfebf060321e256eae7421739439_cryptolocker.exe

  • Size

    38KB

  • MD5

    4c64bfebf060321e256eae7421739439

  • SHA1

    cb4722348a8ce6a1a43cacd0e98b9b6e876f6860

  • SHA256

    a26e3d81e8f7e1411ec2a182ee25e9989619663c1f7fb497b0a025744c5465b0

  • SHA512

    5463f2918be7b72f8ba5578c1a0c99da2fd0420d4864e1d4a3703de19415c06f55539221bf0de7f8c346c7b0fd98e7631b01e84d61ce6d07337daca1069d2844

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6DyE9xS:bIDOw9a0Dwo3P1ojvUSD79A

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_4c64bfebf060321e256eae7421739439_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_4c64bfebf060321e256eae7421739439_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:908
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3060

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\lossy.exe

            Filesize

            38KB

            MD5

            aa38250eb2920847369ddaf48436cd36

            SHA1

            3a3ac46d0a74f647d3e505c3227bd78a9be0c9d5

            SHA256

            0e7778c0997cd21e7c3289315d09ca099b50d10ae285ba135176c437e8856c02

            SHA512

            5d2ce6602a4befd0b84efcb9c700825e831e066a9474b12e6b9d512e5d8830981d3aef601750e811835b299817cd87cefc25bd591a6a93f3192bdff958ab2174

          • memory/908-18-0x0000000002030000-0x0000000002036000-memory.dmp

            Filesize

            24KB

          • memory/908-17-0x0000000002130000-0x0000000002136000-memory.dmp

            Filesize

            24KB

          • memory/4900-0-0x00000000022F0000-0x00000000022F6000-memory.dmp

            Filesize

            24KB

          • memory/4900-1-0x00000000022F0000-0x00000000022F6000-memory.dmp

            Filesize

            24KB

          • memory/4900-2-0x0000000002180000-0x0000000002186000-memory.dmp

            Filesize

            24KB